Qu Shengyu.Research and development of industrial data security based on adaptive differential privacy mechanisms[J].Telecommunications Science,2026,42(03):44-53.
Qu Shengyu.Research and development of industrial data security based on adaptive differential privacy mechanisms[J].Telecommunications Science,2026,42(03):44-53. DOI: 10.11959/j.issn.1000-0801.2026092.
Research and development of industrial data security based on adaptive differential privacy mechanisms
an adaptive differential privacy (ADP) framework was proposed as a new paradigm for privacy protection in dynamic environments. The theoretical evolution and industrial adaptability of ADP were systematically elaborated. Three core technical pathways were distilled: dynamic privacy budget scheduling
correlation‑aware sensitivity estimation
and privacy‑utility balance optimization. The effectiveness of the approach was validated through three typical industrial scenarios: industrial control systems
supply‑chain collaboration
and predictive maintenance. The results demonstrate that ADP can overcome the “utility‑privacy” trade‑off inherent in static differential privacy
enabling synergistic optimization of privacy preservation and data value extraction in complex industrial settings. Finally
it was pointed out that compact privacy analysis
efficient processing of high‑dimensional heterogeneous data
robustness design
and the construction of a standardized ecosystem represented key future directions for research and application in industrial data security.
关键词
Keywords
references
Liu Y , Chi C , Zhang Y W , et al . Identification and resolution for industrial Internet: architecture and key technology [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 18 ): 16780 - 16794 .
Zhuo Z Y , Zhang N , Xie X R , et al . Key technologies and developing challenges of power system with high proportion of renewable energy [J ] . Automation of Electric Power Systems , 2021 , 45 ( 9 ): 171 - 191 .
Liu Y , Xie B , Han T Y , et al . Modeling identifiable data in industrial Internet [J ] . IEEE Access , 2020 , 8 : 29140 - 29148 .
Xie G X , Hou G P , Pei Q Q , et al . Lightweight privacy protection via adversarial sample [J ] . Electronics , 2024 , 13 ( 7 ): 1230 .
IBM Security . 2023 cost of a data breach report [R ] . 2023 .
Xiong S Q , He D J , Wang Z D , et al . Review of federated learning and its security and privacy protection [J ] . Computer Engineering , 2024 , 50 ( 5 ): 1 - 15 .
Chen Z Y , Zheng H , Liu G , et al . AWDP-FL: an adaptive differential privacy federated learning framework [J ] . Electronics , 2024 , 13 ( 19 ): 3959 .
Huang H B , Yan M , Yan Q , et al . Research and implementation of a classification method of industrial big data for security management [J ] . Transactions on Emerging Telecommunications Technologies , 2024 , 35 ( 11 ): e70021 .
Soria-Comas J , Domingo-Ferrer J , Sánchez D , et al . Individual differential privacy: a utility-preserving formulation of differential privacy guarantees [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 6 ): 1418 - 1429 .
Feng X J , Zhang C P . MPLDP: multi-level personalized local differential privacy method [J ] . IEEE Access , 2024 , 12 : 99739 - 99754 .
Rajpurohit T , Haddad W M . Lyapunov and converse Lyapunov theorems for stochastic semistability [J ] . Systems & Control Letters , 2016 , 97 : 83 - 90 .
Pasa L , Navarin N , Sperduti A . Multiresolution reservoir graph neural network [J ] . IEEE Transactions on Neural Networks and Learning Systems , 2022 , 33 ( 6 ): 2642 - 2653 .
Tang C W , Yang X K , Zhai G T . Robust noise estimation based on noise injection [J ] . Journal of Signal Processing Systems , 2014 , 74 ( 1 ): 69 - 78 .
Bai C , Li H Q . Simultaneous prediction in the generalized linear model [J ] . Open Mathematics , 2018 , 16 ( 1 ): 1037 - 1047 .
Wang Z M , Ding Y R , Jin X M , et al . Task offloading for edge computing in industrial Internet with joint data compression and security protection [J ] . The Journal of Supercomputing , 2023 , 79 ( 4 ): 4291 - 4317 .
Wang Y F , Li S B , Chen K K , et al . Privacy-preserving incentive allocation for fair and resilient data sharing in resource-constrained edge computing networks [J ] . Mathematics , 2025 , 13 ( 3 ): 422 .
Wang S N , Li C G . Distributed stochastic algorithm for global optimization in networked system [J ] . Journal of Optimization Theory and Applications , 2018 , 179 ( 3 ): 1001 - 1007 .
Amouzou G , Atchonouglo K , Holweck F . Phase sensitivity of entanglement in the Quantum Phase Estimation algorithm [J ] . Physica Scripta , 2024 , 99 ( 9 ): 095122 .
Ahmed M O , Vaswani S , Schmidt M . Combining Bayesian optimization and Lipschitz optimization [J ] . Machine Learning , 2020 , 109 ( 1 ): 79 - 102 .
Zhao D Y , Wang M , Zhao D Y , et al . Smart manufacturing promotes high-quality development of enterprises in China [J ] . Sustainability , 2024 , 16 ( 23 ): 10431 .
Eesee A K , Varga V , Eigner G , et al . Impact of work instruction difficulty on cognitive load and operational efficiency [J ] . Scientific Reports , 2025 , 15 : 11028 .
Soria-Comas J , Domingo-Ferrer J , Sánchez D , et al . Individual differential privacy: a utility-preserving formulation of differential privacy guarantees [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 6 ): 1418 - 1429 .
Kenett R S , Gotwalt C . The analysis of association rules: sensitivity analysis [J ] . Applied Stochastic Models in Business and Industry , 2025 , 41 ( 3 ): e70022 .
Li T Y , Wang B H , Shang F T , et al . Threat model and construction strategy on ADS-B attack data [J ] . IET Information Security , 2020 , 14 ( 5 ): 542 - 552 .
Hamdipoor V , Meskin N , Cassandras C G . Safe control synthesis using environmentally robust control barrier functions [J ] . European Journal of Control , 2023 , 74 : 100840 .